Vulnerability Name: | CVE-2010-1871 (CCN-60794) | ||||||||
Assigned: | 2010-07-28 | ||||||||
Published: | 2010-07-28 | ||||||||
Updated: | 2017-11-10 | ||||||||
Summary: | JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. Note: this is only a vulnerability when the Java Security Manager is not properly configured. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20130528 CA20130528-01: Security Notice for CA Process Automation (CA PAM) Source: MITRE Type: CNA CVE-2010-1871 Source: CCN Type: RHSA-2010-0564 Important: jboss-seam2 security update Source: CCN Type: JBoss Seam Web page Seam Framework Source: CCN Type: SA53610 CA Multiple Products JBoss Seam Component EL Expressions Processing Vulnerability Source: CCN Type: SECTRACK ID: 1024253 JBoss Seam Input Validation Flaw in Processing JBoss Expression Language Expressions Lets Remote Users Execute Arbitrary Code Source: CCN Type: OSVDB ID: 66881 JBoss Seam 2 JBoss Expression Language Crafted URL Arbitrary Code Execution Source: REDHAT Type: UNKNOWN RHSA-2010:0564 Source: BID Type: UNKNOWN 41994 Source: CCN Type: BID-41994 JBoss Seam Parameterized EL Expressions Remote Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN 1024253 Source: VUPEN Type: Vendor Advisory ADV-2010-1929 Source: CCN Type: Red Hat Bugzilla Bug 615956 CVE-2010-1871 JBoss Seam / Seam2: Improper sanitization of parametrized JBoss EL expressions (ACE) Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=615956 Source: XF Type: UNKNOWN seam-expressions-code-execution(60794) Source: XF Type: UNKNOWN seam-expressions-code-execution(60794) Source: CCN Type: Packet Storm Security [04-03-2015] JBoss Seam 2 File Upload / Execute Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20161017-0001/ Source: CCN Type: CA20130528-01 Security Notice for CA Process Automation (CA PAM) Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-06-2015] | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |